An organization has hired a penetration tester to test the security of its ten web servers. The penetration tester
is able to gain root/administrative access in several servers by exploiting vulnerabilities associated with the
implementation of SMTP, POP, DNS, FTP, Telnet, and IMAP. Which of the following recommendations should
the penetration tester provide to the organization to better protect their web servers in the future?
Use a honeypot
Disable unnecessary services
Implement transport layer security
Increase application event logging